Vulnerabilities (CVE)

Filtered by CWE-321
Total 166 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-9335 1 Redlion 4 Sixnet-managed Industrial Switches, Sixnet-managed Industrial Switches Firmware, Stride-managed Ethernet Switches and 1 more 2024-11-21 10.0 HIGH 10.0 CRITICAL
A hard-coded cryptographic key vulnerability was identified in Red Lion Controls Sixnet-Managed Industrial Switches running firmware Version 5.0.196 and Stride-Managed Ethernet Switches running firmware Version 5.0.190. Vulnerable versions of Stride-Managed Ethernet switches and Sixnet-Managed Industrial switches use hard-coded HTTP SSL/SSH keys for secure communication. Because these keys cannot be regenerated by users, all products use the same key. The attacker could disrupt communication or compromise the system. CVSS v3 base score: 10, CVSS vector string: (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). Red Lion Controls recommends updating to SLX firmware Version 5.3.174.
CVE-2024-11308 1 Trcore 1 Dvc 2024-11-20 N/A 6.2 MEDIUM
The DVC from TRCore encrypts files using a hardcoded key. Attackers can use this key to decrypt the files and restore the original content.
CVE-2024-46889 1 Siemens 1 Sinec Ins 2024-11-13 N/A 5.3 MEDIUM
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application uses hard-coded cryptographic key material to obfuscate configuration files. This could allow an attacker to learn that cryptographic key material through reverse engineering of the application binary and decrypt arbitrary backup files.
CVE-2024-20350 2024-09-26 N/A 7.5 HIGH
A vulnerability in the SSH server of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to impersonate a Cisco Catalyst Center appliance. This vulnerability is due to the presence of a static SSH host key. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on SSH connections, which could allow the attacker to intercept traffic between SSH clients and a Cisco Catalyst Center appliance. A successful exploit could allow the attacker to impersonate the affected appliance, inject commands into the terminal session, and steal valid user credentials.
CVE-2024-42418 1 Avtecinc 3 Outpost 0810, Outpost 0810 Firmware, Outpost Uploader Utility 2024-09-04 N/A 7.5 HIGH
Avtec Outpost uses a default cryptographic key that can be used to decrypt sensitive information.
CVE-2024-41260 2024-08-06 N/A 7.5 HIGH
A static initialization vector (IV) in the encrypt function of netbird v0.28.4 allows attackers to obtain sensitive information.